This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π‘οΈ **CWE-290**: Authentication Bypass by Spoofing. <br>π **Flaw**: The proxy fails to validate the `X-Forwarded-Uri` header when skip-auth rules are active.β¦
π« **Public Exploit**: No PoC provided in data. <br>π **Status**: Confirmed via GitHub Advisory (GHSA-7x63-xv5r-3p2x). <br>β οΈ **Risk**: Wild exploitation likely soon due to low barrier.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1. Check version: Is it 7.5.0 - 7.15.1? <br>2. Config: Do you use `skip-auth` rules? <br>3. Headers: Are you passing `X-Forwarded-Uri`?β¦